US10477151B2 - Method and apparatus for supporting multiple broadcasters independently using a single conditional access system - Google Patents

Method and apparatus for supporting multiple broadcasters independently using a single conditional access system Download PDF

Info

Publication number
US10477151B2
US10477151B2 US15/652,082 US201715652082A US10477151B2 US 10477151 B2 US10477151 B2 US 10477151B2 US 201715652082 A US201715652082 A US 201715652082A US 10477151 B2 US10477151 B2 US 10477151B2
Authority
US
United States
Prior art keywords
receiver module
encrypted
pairing key
information
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US15/652,082
Other versions
US20170318263A1 (en
Inventor
Ronald P. Cocchi
Gregory J. Gagnon
Dennis R. Flaharty
Michael A. Gorman
Jacob T. Carson
Matthew A. Skubiszewski
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rambus Inc
Original Assignee
Inside Secure SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from PCT/US2005/037197 external-priority patent/WO2006044765A2/en
Priority to US15/652,082 priority Critical patent/US10477151B2/en
Application filed by Inside Secure SA filed Critical Inside Secure SA
Publication of US20170318263A1 publication Critical patent/US20170318263A1/en
Assigned to SYPHERMEDIA INTERNATIONAL, INC. reassignment SYPHERMEDIA INTERNATIONAL, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CARSON, Jacob T., COCCHI, RONALD P., FLAHARTY, DENNIS R., GAGNON, GREGORY J., GORMAN, MICHAEL A., SKUBISZEWSKI, Matthew A.
Assigned to INSIDE SECURE S.A. reassignment INSIDE SECURE S.A. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SYPHERMEDIA INTERNATIONAL, INC.
Priority to PCT/US2018/042542 priority patent/WO2019018431A1/en
Assigned to GLAS SAS, AS SECURITY AGENT reassignment GLAS SAS, AS SECURITY AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INSIDE SECURE
Assigned to VERIMATRIX reassignment VERIMATRIX CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: INSIDE SECURE
Assigned to VERIMATRIX reassignment VERIMATRIX CHANGE OF ADDRESS Assignors: VERIMATRIX
Priority to US16/670,912 priority patent/US20200068174A1/en
Priority to US16/670,957 priority patent/US20200068175A1/en
Publication of US10477151B2 publication Critical patent/US10477151B2/en
Application granted granted Critical
Assigned to INSIDE SECURE reassignment INSIDE SECURE PARTIAL RELEASE OF SECURITY INTEREST IN PATENT COLLATERAL Assignors: GLAS SAS, AS AGENT
Assigned to RAMBUS INC. reassignment RAMBUS INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VERIMATRIX
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1012Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to domains
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/109Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2543Billing, e.g. for subscription services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26606Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/418External card to be used in combination with the client device, e.g. for conditional access
    • H04N21/4181External card to be used in combination with the client device, e.g. for conditional access for conditional access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/426Internal components of the client ; Characteristics thereof
    • H04N21/42684Client identification by a unique number or address, e.g. serial number, MAC address, socket ID
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • H04N21/4367Establishing a secure communication between the client and a peripheral device or smart card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/472End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • H04N7/163Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • H04N7/165Centralised control of user terminal ; Registering at central
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/173Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
    • H04N7/17309Transmission or handling of upstream communications
    • H04N7/17318Direct or substantially direct transmission and handling of requests
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Definitions

  • Flaharty filed Jul. 13, 2007, now issued as U.S. Pat. No. 8,243,925, which is a national phase application of International Patent application No.: PCT/US2005/037197, entitled “METHOD AND APPARATUS FOR SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM,” by Ronald P. Cocchi, Gregory J. Gagnon, and Dennis R. Flaharty, filed Oct. 18, 2005, which claims benefit of U.S. Provisional Patent Application No. 60/619,663, entitled “METHOD OF SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM,” by Ronald P. Cocchi, Gregory J. Gagnon, and Dennis R. Flaharty, filed Oct. 18, 2004, all of which applications are hereby incorporated by reference herein.
  • the present invention relates to systems and methods for providing conditional access to media programs, and in particular to a system and method for providing for such conditional access between multiple independent broadcasters and a plurality of customers using a single conditional access system.
  • subscriber-based services are readily available in some areas, they are not available on a world-wide basis.
  • subscribers are typically offered services from a small number of providers (e.g. DIRECTV or ECHOSTAR, or the approved local cable provider) each of which typically provide a large number of media channels from a variety of sources (e.g. ESPN, HBO, COURT TV, HISTORY CHANNEL).
  • providers e.g. DIRECTV or ECHOSTAR, or the approved local cable provider
  • sources e.g. ESPN, HBO, COURT TV, HISTORY CHANNEL
  • each service provider typically encrypts the program material and provides equipment necessary for the customer to decrypt them so that they can be viewed.
  • the present invention discloses a method, apparatus, article of manufacture for brokering the enabling of communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers, each encrypted media program decryptable by a first receiver module securely communicating with a second receiver module according to a pairing key associated with one of the plurality of receivers.
  • the method comprises the steps of transmitting a service enabling request from one of the plurality of broadcasters to a broker independent from the one of the plurality of broadcasters, the request comprising an identification of the one of the plurality of receivers; receiving a first encrypted version of the pairing key E S 1 [K p ] from the broker, the first encrypted version of the pairing key E S 1 [K p ] decryptable by first information S 1 securely stored in the first receiver module of the one of the plurality of receivers; generating a second encrypted version of the pairing key K p , the second encrypted version of the pairing key E S 2 [K p ] decryptable by second information S 2 securely stored in the second receiver module; and transmitting the first encrypted version of the pairing key E S 1 [K p ] and the second encrypted version of the pairing key E S 2 [K p ] to the one of the plurality of receivers.
  • the apparatus is described by system for brokering the enabling of communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers, each encrypted media program decryptable by a first receiver module securely communicating with a second receiver module according to a pairing key K p associated with one of the plurality of receivers.
  • the system comprises a broker, for providing a first encrypted version of the pairing key E S 1 [K p ] in response to a service enabling request from one of the plurality of broadcasters, the service request having an identification of one of the plurality of receivers, wherein the first encrypted version of the pairing key E S 1 [K p ] is decryptable by first information S 1 stored in the first receiver module.
  • at least one of the first information S 1 and the second information S 2 may be derived from a hardware root of trust stored in at least one of the first receiver module and the second receiver module
  • FIG. 1 is a diagram illustrating a media program distribution system
  • FIG. 2 is a diagram of a typical subscriber station
  • FIG. 3 is a diagram illustrating a multiple broadcaster media program distribution system
  • FIGS. 4A-4D are diagrams illustrating one embodiment of how the pairing system cooperatively operates with multiple service providers and equipment at the subscriber stations to implement a conditional access system
  • FIG. 5A is a diagram illustrating one embodiment of the service provider
  • FIG. 5B is a diagram illustrating an embodiment of a table stored in the pairing system
  • FIG. 5C is a diagram illustrating an embodiment of a table stored by the service provider
  • FIG. 6 is a diagram illustrating one embodiment of the STB
  • FIG. 7 is a diagram illustrating an exemplary embodiment of the transport module and the CAM.
  • FIG. 8 is a diagram of a computer that can be used to implement selected modules.
  • FIG. 1 is a diagram illustrating a media program distribution system 100 .
  • the system 100 includes a plurality of service providers (hereinafter alternatively referred to as broadcasters) 102 , including a first service provider 102 A that broadcasts media programs from a satellite broadcast facility 152 A via one or more uplink antennas and one or more satellites 156 , a second service provider 102 B, that broadcasts media programs from terrestrial broadcast facility 152 B and one or more terrestrial antennas 164 , and a third service provider 102 C that broadcasts media programs via a cable link 160 .
  • broadcasters service providers
  • the system 100 also comprises a plurality of subscriber stations 104 A, 104 B (alternatively referred to hereinafter as subscriber station 104 ), each providing service to one or more subscribers 112 A, 112 B (alternatively referred to hereinafter as subscribers 112 ).
  • Each subscriber station 104 A, 104 B may include a satellite reception antenna 106 A, 106 B (alternatively referred to hereinafter as satellite reception antenna 106 ) and/or a terrestrial broadcast antenna 108 A, 108 B (alternatively referred to hereinafter as terrestrial broadcast antenna 108 ) communicatively coupled to a receiver 110 A, 110 B (alternatively referred to hereinafter as receiver 110 ), which is also known as a set top box (STB) or an integrated receiver/decoder (IRD).
  • STB set top box
  • ITD integrated receiver/decoder
  • each receiver 110 A, 110 B (or at least, each conditional access system used with each receiver) is capable of receiving subscriber-based media programs from only one of the media program providers 102 .
  • the subscriber may need not only to have a multiple receivers 110 at the subscriber station 104 A, but also, will require multiple conditional access systems.
  • FIG. 2 is a diagram of a typical subscriber station 104 .
  • Each station 104 includes at least one receiver or STB 110 , which itself includes a transport module 202 that communicates with a conditional access module (CAM) 206 .
  • the CAM 206 is a smart card that is removably communicatively coupleable to the transport module 202 and hence, the STB 110 .
  • the CAM 206 is a device such as a chip or a collection of devices that are physically integrated with the STB 110 and irremovable.
  • the service providers typically encrypt the media program M with a control word CW, thus producing and encrypted program E CW [M], and transmit the encrypted media program E CW [M] and an encrypted version of the control word E[CW] to the receiver 110 .
  • the receiver 110 receives both the encrypted program E CW [M] and the encrypted control word E[CW].
  • the transport module 202 analyzes the incoming data stream and passes the encrypted control E[CW] to the CAM 206 , which decrypts the control word CW and returns the decrypted control word CW to a security module 204 or similar device in the transport module 202 .
  • the security module 204 uses the control word CW to decrypt the encrypted media program E CW [M] to produce the media program M for presentation to the subscriber.
  • This system assures that only those who are in possession of a valid CAM 206 can receive and decode media programs. However, it does not prevent the use of the CAM 206 in any other STB 110 . Hence, if the CAM 206 is compromised or duplicated, unauthorized access to media programs is possible.
  • FIG. 3 is a diagram illustrating a multiple broadcaster Conditional Access Subscriber Administration System (CASAS) 200 .
  • the CASAS 200 is similar to that which is disclosed in FIG. 1 , but includes a pairing broker 304 , which can communicate with the broadcast facilities 152 via a communications medium 302 such as the Internet.
  • a communications medium 302 such as the Internet.
  • FIGS. 4A-4D are diagrams illustrating one embodiment of how the pairing broker 304 cooperatively operates with multiple service providers 102 and equipment at the subscriber stations 104 to implement a conditional access system.
  • FIGS. 4A-4D will be described in connection with and with reference to FIGS. 5 and 6 , which illustrate one embodiment of the service provider 102 elements and STB 110 elements, respectively.
  • FIG. 4A begins with a potential customer 112 who has decided to subscribe a media program service offered by a service provider 102 . To do so, the subscriber contacts the service provider 102 and transmits information sufficient to identify the STB and the CAM to the service provider 102 , as shown in block 402 .
  • this information includes an STB 110 unique identifier (ID) (such as a serial number or other designation) and a CAM 206 unique identifier (CAM ID). In a preferred embodiment, this is accomplished by transmitting the information via the Internet 302 or similar network.
  • ID STB 110 unique identifier
  • CAM ID CAM 206 unique identifier
  • the subscriber's web browser can include the appropriate references to the URL where the request and STB ID and CAM ID should be transmitted.
  • the potential subscriber in addition to the STB ID, the potential subscriber also transmits his/her credit card information (e.g. the account number) as well. This allows for services to be automatically billed for monthly subscription fees without further interaction.
  • Credit card payment administration can be performed by the service provider 102 or by a third party such as PAYPAL. These functions can be performed by the subscriber administration module (SAM) 504 .
  • SAM subscriber administration module
  • the SAM 504 can also comprise or be integrated with a customer relationship management (CRM) system or systems. If access is approved (e.g. if the supplied credit card information has been verified), the subscriber administration module 504 directs the web transaction module 502 to request a pairing key K p from the pairing broker 304 .
  • CRM customer relationship management
  • the potential customer 112 can contact the service provider 102 via telephone or other means and provide the service request, STB ID, and CAM ID.
  • the pairing broker 304 can receive the service request (preferably via an appropriate Internet interface) and forward the request for service and the appropriate identifying information to the service provider 102 .
  • the service provider 102 receives the service request the identifying information, as shown in block 404 .
  • the service provider 102 then transmits an enabling service request and the STB ID to the pairing broker 304 , as shown in block 408 .
  • the pairing broker 304 receives the service enabling request and the STB ID.
  • a first encrypted version of a pairing key K p is then provided.
  • the pairing key K p was generated either in block by the service provider 102 , as shown in block 406 or, preferably by the pairing broker 304 , as shown in block 406 ′.
  • the first encrypted version of the pairing key K p is provided so as to be decryptable using first information S 1 securely stored in a first receiver module such as the transport module 202 shown in FIG.
  • the first encrypted version of the pairing key K p therefore described as E S 1 [K p ]). In one embodiment, this is accomplished by use of a secret that is known to the pairing broker 304 , but unknown to the service provider 102 .
  • the STB IDs and related first information S 1 can be stored in a table or a database 514 in the pairing broker 304 . If desired, the related first encrypted versions of the pairing key E S 1 [K p ] can be stored as well.
  • the first encrypted version of the pairing key E S 1 [K p ] is transmitted to the service provider 102 . If the pairing key K p was generated by the pairing broker 304 , the pairing key K p is also transmitted to the service provider 102 . One of both of the first encrypted version of the pairing key E S 1 [K p ] and the pairing key K p can be securely transmitted to the service provider 102 via a shared secret, a private key, or a public/private key security paradigm, if desired.
  • the foregoing process can be used to request all services from a service provider with a single pairing key K p or repeated to request other services from the service provider 102 , with each service enabled and controlled via a different pairing key K p .
  • the service provider 102 may provide both general services (e.g. access to a number of channels as a part of a baseline fee service) and pay-per-view services (e.g. access to a particular program or set of programs on a pay-per-view basis).
  • the foregoing process can be repeated for those services, resulting in the provision of a first encrypted version of a different pairing key for each service.
  • the system 200 has the ability to store credit information in the security module 204 , CAM 206 , or elsewhere, and can therefore limit the amount of IPPV events the subscriber can purchase prior to requesting additional credits.
  • the potential subscriber 112 can repeat this process for each service provider 102 from which they wish to receive service.
  • FIG. 5B is a diagram showing a table that might be used to store and relate the STB ID to first information S 1 , a service provider 102 identifier (BDCST ID), and pairing keys for general services, IPPV, and multiple OPPV services.
  • BDCST ID service provider 102 identifier
  • the service provider 102 receives the first encrypted version of the pairing key K p , and generates a second encrypted version of the pairing key K p such that it is decryptable by second information S 2 securely stored in a second receiver module such as the conditional access module 206 (the second encrypted version of the pairing key K p therefore described as E S 2 [K p ]).
  • the service provider 102 can store a table or database relating STB IDs and the pairing keys K p for each of the provided services.
  • FIG. 5C is an example of how such information may be stored. Note that the BRDCST ID column is not necessary in this case, because the identity of the service provider 102 is inherently known.
  • the service provider 102 transmits an entitlement control message (ECM) or an entitlement management message (EMM) to the subscriber station.
  • ECM entitlement control message
  • EMM entitlement management message
  • the ECM is transmitted to the STB 110 in response to a subscriber request for access to general media programs from the service provider 102 , while the EMM is transmitted in response to a subscriber request for a specific program (e.g. an impulse or order ahead pay-per-view).
  • the ECM/EMM includes the first encrypted version of the applicable pairing key E S 1 [K p ], the second encrypted version of the pairing key E S 2 [K p ], and the ID of the service provider 102 (BRDCST ID) which is providing the services related to the pairing key K p .
  • This transmission can be accomplished via the same system used to transmit the media program M itself, or a different communication system such as the Internet or a public switched telephone network (PSTN) or cellphone network.
  • the transport module 202 receives the first encrypted version of the pairing key E S 1 [K p ] and the second encrypted version of the pairing key E S 2 [K p ], and the service provider ID.
  • the second encrypted version of the pairing key E S 2 [K p ] is provided to the conditional access module 310 , where it is received, decrypted (using the second information S 2 ) to obtain the pairing key K p which is stored (along with a reference to the service provider ID (BRDCST ID) from which the pairing key K p was received), as shown in blocks 428 and 430 .
  • the first encrypted version of the pairing key E S 1 [K p ] is decrypted and stored in the transport module 202 (also along with a reference to the service provider ID from which the pairing key K p was received), as shown in block 432 .
  • FIG. 6 shows an exemplary embodiment of how the data relating services, broadcasters, and pairing keys K p might be stored in the transport module and the conditional access module.
  • the pairing key K p is used to encrypt communications between the conditional access module 206 and the transport module 202 .
  • the conditional access module 206 cannot be used a different STB 110 , although if desired, more than one STB 110 can be provided to a customer, each having the same first information the conditional access module to be used with different STBs 110 in the same household.
  • the broadcast module 506 and/or the broadcast headend 516 encrypts media programs M 510 according to a control word (CW), encrypts the control word (CW) itself, and broadcasts a program stream comprising the encrypted program material E CW [M] and the encrypted control word E[CW] to the STBs 104 , as shown in blocks 450 , 452 and 454 .
  • the program stream may also comprise program guide information from the program guide module 508 .
  • the transport module 202 in the STB 110 receives the program stream, separates out the packets of information by channel (typically according to a packet ID), and provides the encrypted control word E[CW] to the conditional access module 206 .
  • the conditional access module 206 receives the encrypted control word E[CW] decrypts it to recover the control word (CW), encrypts the control word (OF) with the pairing key K p , and provides the encrypted pairing key E K p [CW] to the transport module 202 , as shown in blocks 460 - 466 .
  • the transport module 202 decrypts the encrypted control word E K p [CW] using the pairing key K p thus recovering the control word (CW), as shown in block 472 , and uses the decrypted control word (CW) to decrypt the encrypted media program E CW [M] to produce the media program M, as shown in block 474 .
  • the foregoing system can be used to modify or change the provision of services from the service provider 102 as well. This can be accomplished by the service provider 102 deleting, adding, or modifying the pairing keys K p in cooperation with the pairing broker 304 in essentially the same way as described above. Such modification can occur at the subscriber's behest (e.g. the subscriber desires either more, less, or different services than previously), or that of the service provider 102 (e.g. if the offered services change or the subscriber's credit card is no longer valid).
  • the modules described above can be implemented as one or more software modules comprising instructions being performed by one or more special or general purpose processors, or may be implemented with hardware modules having dedicated circuitry, or with both hardware and software modules.
  • the pairing broker 304 is implemented by a pairing server
  • the program guide module 508 , broadcast module 506 , subscriber administration module 504 and web transaction module 502 are all implemented as servers
  • the transport module 202 and security module 204 are implemented in a secure, tamperproof electronic circuit
  • the conditional access module is implemented on a smart card.
  • the system and method described above uses unique secrets S 1 and S 2 into the transport module 202 and CAM 206 .
  • the unique secrets S 1 and S 2 can be derived from a hardware root of trust that is programmed into the device itself.
  • the transport module 202 or CAM may be at least partially implemented using System-on-Chip (SoC) architectures that permit hardware root of trust values to be programmed into the SoC at the SoC manufacturing site using black-box techniques.
  • SoC System-on-Chip
  • SoC programming can also occur at the packaging or product manufacturing facility by execution of an in-field programming sequence on the SoC.
  • a security provider independent architecture can support multiple concurrent or serial CAS and DRM implementations using a single black box programming security platform with limited One Time Programming (OTP) resources to store secrets representing the hardware root of trust that are used to derive the S 1 and S 2 values.
  • OTP One Time Programming
  • security providers may use black box OTP resources as the basis to derive security keys to enable different security schemes by altering the key generation inputs based on CAS and DRM vendor software and possibly vendor unique OTP inputs.
  • the key generation inputs can be provided in the CAS and DRM application that could be loaded at CE device manufacturing or downloaded over the air for a fielded CE device.
  • Key derivation can be accomplished in a number of ways, for example, by taking the black box programmed secret OTP keys, CAS/DRM vendor (security provider) software input and possible CAS/DRM vendor unique OTP values and combining in a series of crypto graphic calculations using AES, DES or Triple DES. Where the black box programmed secret OTP keys are used as the key and the software input and CAS/DRM vendor unique OTP values are the data in the crypto graphic operation.
  • the SoC can derive unique key outputs for each CAS and DRM security provider used for a given content provider or broadcaster.
  • CAS unique inputs such as their assigned conditional access identifier (CA ID) maybe used to differentiate derived keys for different conditional access systems CAS 1 versus CAS 2 .
  • CA ID conditional access identifier
  • These security provider unique key generation outputs enable support for multiple security providers for fielded CE devices typically found in STBs 110 , televisions (TVs), Smart TVs and mobile devices such as smartphones.
  • the black box security provider provides compatible headend applications to each content provider, so that the media programs are encrypted or otherwise protected using the CAS and DRM implementation used.
  • Another advantage of using a derived key database is that the black box programmed OTP key secrets programmed into the SoC OTP do not have to be divulged to the multiple CAS and DRM security providers, since these security providers would use the derived key databases for their content protection systems, not the OTP value. This means that if a derived key database were compromised, it only affects the specific CAS/DRM security provider that was using that specific derived key database, i.e. such compromise would not affect the fielded CE devices or derived key databases of any other such CAS/DRM security provider.
  • the keys and programming infrastructure provided by an independent black box security provider enables fielded CE devices to add additional revenue baring applications to the CE device manufacturer or content provider giving these entities more flexibility in managing their business and offering new services. Besides switching out a CAS/DRM vendor for any number of reasons, enabling the ability to add applications supporting new CAS/DRM vendors in fielded CE devices can result in generating significantly higher content sale revenues without requiring consumers to upgrade their CE devices. Consumer savings are realized by extending the field life of the CE device by allowing the consumer to download new software images to enable the purchase of new content services without having to replace their fielded CE devices.
  • Extending Fixed Secrets with Key Derivation can be used to extend the fixed secret, S 1 , shown in FIGS. 5A and 5B to decrypt either of the encrypted paring keys E S 1 [K p ], E S 2 [K p ] to with secrets S 1 and S 2 , respectively produce the pairing key K p that is used to decrypt the ECW shown in FIG. 4C .
  • the extension provides the ability to: (1) Use derived root keys to produce S 1 and alternately or in addition, using such root keys to produce S 2 and (2) Use this derivation process as a means of renewing key material for a fielded system.
  • hardware root of trust values can provide the basis for security providers such as the pairing broker 304 and/or one or more of the broadcasters 102 to derive a plurality of different security keys.
  • security providers such as the pairing broker 304 and/or one or more of the broadcasters 102 to derive a plurality of different security keys.
  • Such keys can be used to add new security procedures or modify procedures already implemented. This can be accomplished, for example, by altering the key generation inputs based on security provider software (CAS or DRM) and possibly inputs vendor-unique hardware root of trust values.
  • the key generation inputs can be provided in the CAS and DRM application software that could be loaded at into consumer electronics (CE) devices such as the transport module 2002 or CAM 206 when the devices are manufacture, or remotely downloaded over the air for a fielded CE device. This permits cryptographic separation of the CE devices at both S 1 and S 2 .
  • CE consumer electronics
  • Such hardware root of trust values can include one-time-programmable (OTP) values programmed into the transport module 202 and or CAM 206 using, for example, black box techniques also described in U.S. Patent Publication No. 2017/0012952.
  • OTP values may be held secret from other entities as necessary.
  • the pairing broker 304 or third party security provider may provide a black box to the broadcaster 102 or manufacturer of the STB, permitting the storage of an OTP value without disclosing that value to the security provider or broadcaster.
  • Another advantage of using a derived key database is that the black box programmed OTP key secrets programmed into the SoC OTP may be held secret from (do not have to be released to) the CAS or DRM security provider, since these security providers would use the OTP key secrets to derive the keys required for their content protection system. This permits supporting multiple security provider vendors. Further, if a database of derived keys database were compromised, this compromise only affects the specific CAS/DRM security provider that was using that specific derived key database, and would not affect the fielded CE devices or derived key databases of any other such CAS/DRM security provider. This allows S 1 (and/or S 2 ) to be updated in the event of an attack that compromises the database of keys.
  • FIG. 7 is a diagram illustrating an exemplary embodiment of the transport module 202 and the CAM 206 , wherein the transport module 202 includes a hardware root of trust value OTP 1 702 A and/or the CAM 206 has another hardware root of trust value OTP 2 702 B, thus permitting at least one of the first information S 1 and second information S 2 to be derived from a hardware root of trust secret stored in at least one of the transport module 202 and the CAM 206 .
  • the transport module 202 has a SoC with a processor that can perform processor instructions 704 A.
  • the processor has access to OTP 1 702 and can use deriving information such as the processor instructions 704 A to derive or generate the first value S 1 via one or more operations 708 A.
  • the CAM 206 comprises a SoC with a processor that can perform processor instructions 704 B.
  • the processor has access to OTP 1 702 and can use the processor instructions 704 A to generate the first value S 1 via one or more operations 708 B.
  • the transport module 202 may also store one or more further hardware root of trust values OTP 1 706 A 1 and OTP 2 706 A 2 that can also be used as deriving information to generate the first value S 1 .
  • OTP 1 706 A 1 and OTP 2 706 A 2 are security provider-unique, with each allocated to different security providers, allowing the transport module 202 to support CAS/DRM procedures of multiple security providers, allowing each such security provider to use their own OTP value 706 A to generate first information S 1 .
  • security providers may be provided multiple OTP values as well.
  • the CAM 206 may also store one or more further hardware root of trust values OTP 1 706 B 1 and OTP 2 706 B 2 that can also be used to generate the second value S 2 .
  • OTP 1 706 B 1 and OTP 2 706 B 2 may be allocated to the same security provider, or different security providers, allowing the CAM 206 to support CAS/DRM procedures of multiple security providers.
  • FIG. 8 illustrates an exemplary computer system 800 that could be used to implement the servers or the subscriber computer 512 of the present invention.
  • the computer 802 comprises a processor 804 and a memory, such as random access memory (RAM) 806 .
  • the computer 802 is operatively coupled to a display 822 , which presents images such as windows to the user on a graphical user interface 818 B.
  • the computer system 802 may be coupled to other devices, such as a keyboard 814 , a mouse device 816 , a printer, etc.
  • keyboard 814 a keyboard 814
  • a mouse device 816 a printer, etc.
  • printer a printer
  • the computer 802 operates under control of an operating system 808 stored in the memory 806 , and interfaces with the user to accept inputs and commands and to present results through a graphical user interface (GUI) module 818 A.
  • GUI graphical user interface
  • the instructions performing the GUI functions can be resident or distributed in the operating system 808 , the computer program 810 , or implemented with special purpose memory and processors.
  • the computer 802 also implements a compiler 812 which allows an application program 810 written in a programming language such as COBOL, C++, FORTRAN, or other language to be translated into processor 804 readable code.
  • the application 810 accesses and manipulates data stored in the memory 806 of the computer 802 using the relationships and logic that was generated using the compiler 812 .
  • the computer 802 also optionally comprises an external communication device such as a modem, satellite link, Ethernet card, or other device for communicating with other computers.
  • instructions implementing the operating system 808 , the computer program 810 , and the compiler 812 are tangibly embodied in a computer-readable medium, e.g., data storage device 820 , which could include one or more fixed or removable data storage devices, such as a zip drive, floppy disc drive 824 , hard drive, CD-ROM drive, tape drive, etc.
  • the operating system 808 and the computer program 810 are comprised of instructions which, when read and executed by the computer 802 , causes the computer 802 to perform the steps necessary to implement and/or use the present invention.
  • Computer program 810 and/or operating instructions may also be tangibly embodied in memory 806 and/or data communications devices 830 , thereby making a computer program product or article of manufacture according to the invention.
  • article of manufacture “program storage device” and “computer program product” as used herein are intended to encompass a computer program accessible from any computer readable device or media.

Abstract

A method and apparatus for brokering the enablement of the communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers is disclosed. The system makes use of a pairing key for each provided service, which is differently encrypted by a pairing server and by the broadcaster providing the service. The encrypted versions of the pairing key are decrypted in a first receiver module using information known to the pairing service but not the broadcaster and in a second receiver module using information known to the broadcaster. The pairing key is used to cryptographically bind the first and second receiver modules.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS
This application is a continuation-in-part of U.S. patent application Ser. No. 14/692,500, entitled “METHOD AND APPARATUS FOR SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM,” by Ronald P. Cocchi, Gregory J. Gagnon, and Dennis R. Flaharty, filed Apr. 21, 2015, now issued as U.S. Pat. No. 9,014,375, which application is a continuation of U.S. patent application Ser. No. 13/541,492, entitled “METHOD AND APPARATUS FOR SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM,” by Ronald P. Cocchi, Gregory J. Gagnon, and Dennis R. Flaharty, filed Jul. 3, 2012, now issued as U.S. Pat. No. 9,014,375, which application is a continuation of U.S. patent application Ser. No. 11/795,272, entitled “METHOD AND APPARATUS FOR SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM,” by Ronald P. Cocchi, Gregory J. Gagnon, and Dennis R. Flaharty, filed Jul. 13, 2007, now issued as U.S. Pat. No. 8,243,925, which is a national phase application of International Patent application No.: PCT/US2005/037197, entitled “METHOD AND APPARATUS FOR SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM,” by Ronald P. Cocchi, Gregory J. Gagnon, and Dennis R. Flaharty, filed Oct. 18, 2005, which claims benefit of U.S. Provisional Patent Application No. 60/619,663, entitled “METHOD OF SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM,” by Ronald P. Cocchi, Gregory J. Gagnon, and Dennis R. Flaharty, filed Oct. 18, 2004, all of which applications are hereby incorporated by reference herein.
This application also claims benefit of U.S. Provisional Patent application No. 62/446,196, entitled “SIGNALING METHOD FOR CAS SWITCHING AND KFY DERIVATION,” by Ronald P. Cocchi et al., filed Jan. 13, 2017, which is also incorporated by reference herein.
This application is also related to U.S. patent application Ser. No. 15/207,332, entitled “METHOD AND APPARATUS FOR A BLACKBOX PROGRAMMING SYSTEM PERMITTING DOWNLOADABLE APPLICATIONS AND MULTIPLE SECURITY PROFILES PROVIDING HARDWARE SEPARATION OF SERVICES IN HARDWARE CONSTRAINED DEVICES,” by Ronald P. Cocchi et al, filed Jul. 11, 2016, which application claims benefit of U.S. Provisional Patent Application No. 62/191,200, entitled “METHOD AND APPARATUS FOR A BLACKBOX PROGRAMMING SYSTEM PERMITTING DOWNLOADABLE APPLICATIONS AND MULTIPLE SECURITY PROFILES PROVIDING HARDWARE SEPARATION OF SERVICES IN HARDWARE CONSTRAINED DEVICES,” by Ronald P. Cocchi et al, filed Jul. 10, 2015, both of which applications are which is hereby incorporated by reference.
BACKGROUND OF THE INVENTION 1. Field of the Invention
The present invention relates to systems and methods for providing conditional access to media programs, and in particular to a system and method for providing for such conditional access between multiple independent broadcasters and a plurality of customers using a single conditional access system.
2. Description of the Related Art
For many years, media programs such as television and radio programs have been broadcast to viewers/listeners free of charge. More recently, this free-of-charge dissemination model has been augmented with a fee-for-service and/or fee-for-view model in which paying subscribers are provided access to a greater variety and number of media programs, including video programs, audio programs and the like, by cable, satellite and terrestrial broadcasts.
However, while subscriber-based services are readily available in some areas, they are not available on a world-wide basis. Further, in current media program subscription business models, subscribers are typically offered services from a small number of providers (e.g. DIRECTV or ECHOSTAR, or the approved local cable provider) each of which typically provide a large number of media channels from a variety of sources (e.g. ESPN, HBO, COURT TV, HISTORY CHANNEL). To assure that only subscribers receive the media programs, each service provider typically encrypts the program material and provides equipment necessary for the customer to decrypt them so that they can be viewed.
Since they provide a large number of programs and typically at a relatively high cost, the vast majority of customers subscribe to only one of the foregoing services (e.g. DIRECTV, ECHOSTAR, or the local cable provider), but not multiple providers. It is expected that future business models will evolve to the point where customers will subscribe to more than one media provider, each of which provides a smaller number of media channels. The foregoing is especially true in areas where subscriber-based services are in their infancy, including for example, large parts of Asia, Africa, and South America.
One of the roadblocks to the evolution of such services is the means by which the service provider assures that only paying customers receive their media programs. Existing conditional access systems are not compatible with each other, and it is thought to be prohibitively expensive for each provider of a limited number of media programs to produce and provide its own conditional access system to potential subscribers. Another problem is that customers would typically prefer to receive all media programs through a single device (and hence, a single conditional access system), rather than multiple such systems. Accordingly, there is a need in the art for a method and apparatus that allows multiple program providers (e.g. broadcasters) to transmit media programs to paying subscribers via a single conditional access system. The present invention satisfies that need.
SUMMARY OF THE INVENTION
To address the requirements described above, the present invention discloses a method, apparatus, article of manufacture for brokering the enabling of communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers, each encrypted media program decryptable by a first receiver module securely communicating with a second receiver module according to a pairing key associated with one of the plurality of receivers. In one disclosed embodiment, the method comprises the steps of transmitting a service enabling request from one of the plurality of broadcasters to a broker independent from the one of the plurality of broadcasters, the request comprising an identification of the one of the plurality of receivers; receiving a first encrypted version of the pairing key ES 1 [Kp] from the broker, the first encrypted version of the pairing key ES 1 [Kp] decryptable by first information S1 securely stored in the first receiver module of the one of the plurality of receivers; generating a second encrypted version of the pairing key Kp, the second encrypted version of the pairing key ES 2 [Kp] decryptable by second information S2 securely stored in the second receiver module; and transmitting the first encrypted version of the pairing key ES 1 [Kp] and the second encrypted version of the pairing key ES 2 [Kp] to the one of the plurality of receivers. In another disclosed embodiment, the apparatus is described by system for brokering the enabling of communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers, each encrypted media program decryptable by a first receiver module securely communicating with a second receiver module according to a pairing key Kp associated with one of the plurality of receivers. The system comprises a broker, for providing a first encrypted version of the pairing key ES 1 [Kp] in response to a service enabling request from one of the plurality of broadcasters, the service request having an identification of one of the plurality of receivers, wherein the first encrypted version of the pairing key ES 1 [Kp] is decryptable by first information S1 stored in the first receiver module. In each of these embodiments, at least one of the first information S1 and the second information S2 may be derived from a hardware root of trust stored in at least one of the first receiver module and the second receiver module
BRIEF DESCRIPTION OF THE DRAWINGS
Referring now to the drawings in which like reference numbers represent corresponding parts throughout:
FIG. 1 is a diagram illustrating a media program distribution system;
FIG. 2 is a diagram of a typical subscriber station;
FIG. 3 is a diagram illustrating a multiple broadcaster media program distribution system;
FIGS. 4A-4D are diagrams illustrating one embodiment of how the pairing system cooperatively operates with multiple service providers and equipment at the subscriber stations to implement a conditional access system;
FIG. 5A is a diagram illustrating one embodiment of the service provider;
FIG. 5B is a diagram illustrating an embodiment of a table stored in the pairing system;
FIG. 5C is a diagram illustrating an embodiment of a table stored by the service provider;
FIG. 6 is a diagram illustrating one embodiment of the STB;
FIG. 7 is a diagram illustrating an exemplary embodiment of the transport module and the CAM; and
FIG. 8 is a diagram of a computer that can be used to implement selected modules.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
In the following description, reference is made to the accompanying drawings which form a part hereof, and which is shown, by way of illustration, several embodiments of the present invention. It is understood that other embodiments may be utilized and structural changes may be made without departing from the scope of the present invention.
FIG. 1 is a diagram illustrating a media program distribution system 100. The system 100 includes a plurality of service providers (hereinafter alternatively referred to as broadcasters) 102, including a first service provider 102A that broadcasts media programs from a satellite broadcast facility 152A via one or more uplink antennas and one or more satellites 156, a second service provider 102B, that broadcasts media programs from terrestrial broadcast facility 152B and one or more terrestrial antennas 164, and a third service provider 102C that broadcasts media programs via a cable link 160.
The system 100 also comprises a plurality of subscriber stations 104A, 104B (alternatively referred to hereinafter as subscriber station 104), each providing service to one or more subscribers 112A, 112B (alternatively referred to hereinafter as subscribers 112). Each subscriber station 104A, 104B may include a satellite reception antenna 106A, 106B (alternatively referred to hereinafter as satellite reception antenna 106) and/or a terrestrial broadcast antenna 108A, 108B (alternatively referred to hereinafter as terrestrial broadcast antenna 108) communicatively coupled to a receiver 110A, 110B (alternatively referred to hereinafter as receiver 110), which is also known as a set top box (STB) or an integrated receiver/decoder (IRD).
As described above, in prior art systems, each receiver 110A, 110B (or at least, each conditional access system used with each receiver) is capable of receiving subscriber-based media programs from only one of the media program providers 102. Hence, if a subscriber 112 wanted to receive media programs from more than one media program provider 102 on a subscription basis, the subscriber may need not only to have a multiple receivers 110 at the subscriber station 104A, but also, will require multiple conditional access systems.
FIG. 2 is a diagram of a typical subscriber station 104. Each station 104 includes at least one receiver or STB 110, which itself includes a transport module 202 that communicates with a conditional access module (CAM) 206. In one embodiment, the CAM 206 is a smart card that is removably communicatively coupleable to the transport module 202 and hence, the STB 110. In another embodiment, the CAM 206 is a device such as a chip or a collection of devices that are physically integrated with the STB 110 and irremovable. To assure that only those who subscribe to the service are provided with media programs, the service providers typically encrypt the media program M with a control word CW, thus producing and encrypted program ECW[M], and transmit the encrypted media program ECW[M] and an encrypted version of the control word E[CW] to the receiver 110. The receiver 110 receives both the encrypted program ECW[M] and the encrypted control word E[CW]. The transport module 202 analyzes the incoming data stream and passes the encrypted control E[CW] to the CAM 206, which decrypts the control word CW and returns the decrypted control word CW to a security module 204 or similar device in the transport module 202. The security module 204 then uses the control word CW to decrypt the encrypted media program ECW[M] to produce the media program M for presentation to the subscriber. This system assures that only those who are in possession of a valid CAM 206 can receive and decode media programs. However, it does not prevent the use of the CAM 206 in any other STB 110. Hence, if the CAM 206 is compromised or duplicated, unauthorized access to media programs is possible.
FIG. 3 is a diagram illustrating a multiple broadcaster Conditional Access Subscriber Administration System (CASAS) 200. The CASAS 200 is similar to that which is disclosed in FIG. 1, but includes a pairing broker 304, which can communicate with the broadcast facilities 152 via a communications medium 302 such as the Internet.
FIGS. 4A-4D are diagrams illustrating one embodiment of how the pairing broker 304 cooperatively operates with multiple service providers 102 and equipment at the subscriber stations 104 to implement a conditional access system. FIGS. 4A-4D will be described in connection with and with reference to FIGS. 5 and 6, which illustrate one embodiment of the service provider 102 elements and STB 110 elements, respectively.
FIG. 4A begins with a potential customer 112 who has decided to subscribe a media program service offered by a service provider 102. To do so, the subscriber contacts the service provider 102 and transmits information sufficient to identify the STB and the CAM to the service provider 102, as shown in block 402. In one embodiment, this information includes an STB 110 unique identifier (ID) (such as a serial number or other designation) and a CAM 206 unique identifier (CAM ID). In a preferred embodiment, this is accomplished by transmitting the information via the Internet 302 or similar network.
This can be accomplished by use of a web browser implemented in a computer 512 disposed at the subscriber station 104 and a web transaction module 502 implemented at the service provider 102. If desired, the subscriber's web browser can include the appropriate references to the URL where the request and STB ID and CAM ID should be transmitted. In one embodiment, in addition to the STB ID, the potential subscriber also transmits his/her credit card information (e.g. the account number) as well. This allows for services to be automatically billed for monthly subscription fees without further interaction. Credit card payment administration can be performed by the service provider 102 or by a third party such as PAYPAL. These functions can be performed by the subscriber administration module (SAM) 504. The SAM 504 can also comprise or be integrated with a customer relationship management (CRM) system or systems. If access is approved (e.g. if the supplied credit card information has been verified), the subscriber administration module 504 directs the web transaction module 502 to request a pairing key Kp from the pairing broker 304.
This implementation reduces the support requirements for the service provider 102. In other embodiments, the potential customer 112 can contact the service provider 102 via telephone or other means and provide the service request, STB ID, and CAM ID. Further, if desired, the pairing broker 304 can receive the service request (preferably via an appropriate Internet interface) and forward the request for service and the appropriate identifying information to the service provider 102.
The service provider 102 receives the service request the identifying information, as shown in block 404. The service provider 102 then transmits an enabling service request and the STB ID to the pairing broker 304, as shown in block 408. In block 410, the pairing broker 304 receives the service enabling request and the STB ID. A first encrypted version of a pairing key Kp is then provided. The pairing key Kp was generated either in block by the service provider 102, as shown in block 406 or, preferably by the pairing broker 304, as shown in block 406′. The first encrypted version of the pairing key Kp is provided so as to be decryptable using first information S1 securely stored in a first receiver module such as the transport module 202 shown in FIG. 6 (the first encrypted version of the pairing key Kp therefore described as ES 1 [Kp]). In one embodiment, this is accomplished by use of a secret that is known to the pairing broker 304, but unknown to the service provider 102. The STB IDs and related first information S1 can be stored in a table or a database 514 in the pairing broker 304. If desired, the related first encrypted versions of the pairing key ES 1 [Kp] can be stored as well.
In block 414, the first encrypted version of the pairing key ES 1 [Kp] is transmitted to the service provider 102. If the pairing key Kp was generated by the pairing broker 304, the pairing key Kp is also transmitted to the service provider 102. One of both of the first encrypted version of the pairing key ES 1 [Kp] and the pairing key Kp can be securely transmitted to the service provider 102 via a shared secret, a private key, or a public/private key security paradigm, if desired.
The foregoing process can be used to request all services from a service provider with a single pairing key Kp or repeated to request other services from the service provider 102, with each service enabled and controlled via a different pairing key Kp. For example, the service provider 102 may provide both general services (e.g. access to a number of channels as a part of a baseline fee service) and pay-per-view services (e.g. access to a particular program or set of programs on a pay-per-view basis). Therefore, if the foregoing process was undertaken to subscribe to the general services and the potential subscriber 112 desires order ahead pay per view (OPPV) services or impulse pay per view (IPPV) services as well, the foregoing process can be repeated for those services, resulting in the provision of a first encrypted version of a different pairing key for each service. The system 200 has the ability to store credit information in the security module 204, CAM 206, or elsewhere, and can therefore limit the amount of IPPV events the subscriber can purchase prior to requesting additional credits. Finally, the potential subscriber 112 can repeat this process for each service provider 102 from which they wish to receive service.
Although the pairing broker 304 need not generate or store the pairing keys Kp, it may be desirable to do so. FIG. 5B is a diagram showing a table that might be used to store and relate the STB ID to first information S1, a service provider 102 identifier (BDCST ID), and pairing keys for general services, IPPV, and multiple OPPV services.
In block 420, the service provider 102 receives the first encrypted version of the pairing key Kp, and generates a second encrypted version of the pairing key Kp such that it is decryptable by second information S2 securely stored in a second receiver module such as the conditional access module 206 (the second encrypted version of the pairing key Kp therefore described as ES 2 [Kp]).
The service provider 102 can store a table or database relating STB IDs and the pairing keys Kp for each of the provided services. FIG. 5C is an example of how such information may be stored. Note that the BRDCST ID column is not necessary in this case, because the identity of the service provider 102 is inherently known.
In block 422, the service provider 102 transmits an entitlement control message (ECM) or an entitlement management message (EMM) to the subscriber station. The ECM is transmitted to the STB 110 in response to a subscriber request for access to general media programs from the service provider 102, while the EMM is transmitted in response to a subscriber request for a specific program (e.g. an impulse or order ahead pay-per-view). The ECM/EMM includes the first encrypted version of the applicable pairing key ES 1 [Kp], the second encrypted version of the pairing key ES 2 [Kp], and the ID of the service provider 102 (BRDCST ID) which is providing the services related to the pairing key Kp. This transmission can be accomplished via the same system used to transmit the media program M itself, or a different communication system such as the Internet or a public switched telephone network (PSTN) or cellphone network. In block 424, the transport module 202 receives the first encrypted version of the pairing key ES 1 [Kp] and the second encrypted version of the pairing key ES 2 [Kp], and the service provider ID. The second encrypted version of the pairing key ES 2 [Kp] is provided to the conditional access module 310, where it is received, decrypted (using the second information S2) to obtain the pairing key Kp which is stored (along with a reference to the service provider ID (BRDCST ID) from which the pairing key Kp was received), as shown in blocks 428 and 430. Similarly, the first encrypted version of the pairing key ES 1 [Kp] is decrypted and stored in the transport module 202 (also along with a reference to the service provider ID from which the pairing key Kp was received), as shown in block 432. FIG. 6 shows an exemplary embodiment of how the data relating services, broadcasters, and pairing keys Kp might be stored in the transport module and the conditional access module.
Thereafter, the pairing key Kp is used to encrypt communications between the conditional access module 206 and the transport module 202. Henceforward, the conditional access module 206 cannot be used a different STB 110, although if desired, more than one STB 110 can be provided to a customer, each having the same first information the conditional access module to be used with different STBs 110 in the same household.
To begin service, the broadcast module 506 and/or the broadcast headend 516 encrypts media programs M 510 according to a control word (CW), encrypts the control word (CW) itself, and broadcasts a program stream comprising the encrypted program material ECW[M] and the encrypted control word E[CW] to the STBs 104, as shown in blocks 450, 452 and 454. The program stream may also comprise program guide information from the program guide module 508.
The transport module 202 in the STB 110 receives the program stream, separates out the packets of information by channel (typically according to a packet ID), and provides the encrypted control word E[CW] to the conditional access module 206. The conditional access module 206 receives the encrypted control word E[CW] decrypts it to recover the control word (CW), encrypts the control word (OF) with the pairing key Kp, and provides the encrypted pairing key EK p [CW] to the transport module 202, as shown in blocks 460-466. Using an STB application 602 and media kernel 604, the transport module 202 decrypts the encrypted control word EK p [CW] using the pairing key Kp thus recovering the control word (CW), as shown in block 472, and uses the decrypted control word (CW) to decrypt the encrypted media program ECW[M] to produce the media program M, as shown in block 474.
The foregoing system can be used to modify or change the provision of services from the service provider 102 as well. This can be accomplished by the service provider 102 deleting, adding, or modifying the pairing keys Kp in cooperation with the pairing broker 304 in essentially the same way as described above. Such modification can occur at the subscriber's behest (e.g. the subscriber desires either more, less, or different services than previously), or that of the service provider 102 (e.g. if the offered services change or the subscriber's credit card is no longer valid).
The modules described above can be implemented as one or more software modules comprising instructions being performed by one or more special or general purpose processors, or may be implemented with hardware modules having dedicated circuitry, or with both hardware and software modules. In one embodiment, for example, the pairing broker 304 is implemented by a pairing server, and the program guide module 508, broadcast module 506, subscriber administration module 504 and web transaction module 502 are all implemented as servers, the transport module 202 and security module 204 are implemented in a secure, tamperproof electronic circuit, and the conditional access module is implemented on a smart card.
Derived Key Mechanism in SoCs
The system and method described above uses unique secrets S1 and S2 into the transport module 202 and CAM 206. In the embodiments described below, either or both of the unique secrets S1 and S2 can be derived from a hardware root of trust that is programmed into the device itself. For example, the transport module 202 or CAM may be at least partially implemented using System-on-Chip (SoC) architectures that permit hardware root of trust values to be programmed into the SoC at the SoC manufacturing site using black-box techniques. Since the values of S1 and S2 are computed from the hardware root of trust using software and key values that may be provided by the security provider, this permits later allocation of these SoCs to any one of a number of potential CE device manufacturers and many independent CAS/DRM security providers (security provider in this context broadly refers to any entity that would use the derived key database for a population of fielded CE devices to protect content for purchase by another entity who had a particular CE device in the deployed location (e.g. home). SoC programming can also occur at the packaging or product manufacturing facility by execution of an in-field programming sequence on the SoC.
In traditional broadcast and cable system, content is offered to subscribers within the content distribution ecosystem directly from the service provider, i.e. satellite or cable provider. In some embodiments of such systems, security based on a hardware root of trust is used for high value content. In both CAS and DRM content distribution paradigms, a security provider independent architecture can support multiple concurrent or serial CAS and DRM implementations using a single black box programming security platform with limited One Time Programming (OTP) resources to store secrets representing the hardware root of trust that are used to derive the S1 and S2 values. This “derived key” security architecture implementation can provide a means for instantaneous switching between security profiles offered by different and independent CAS and DRM security providers.
Hence, security providers may use black box OTP resources as the basis to derive security keys to enable different security schemes by altering the key generation inputs based on CAS and DRM vendor software and possibly vendor unique OTP inputs. The key generation inputs can be provided in the CAS and DRM application that could be loaded at CE device manufacturing or downloaded over the air for a fielded CE device.
Key derivation can be accomplished in a number of ways, for example, by taking the black box programmed secret OTP keys, CAS/DRM vendor (security provider) software input and possible CAS/DRM vendor unique OTP values and combining in a series of crypto graphic calculations using AES, DES or Triple DES. Where the black box programmed secret OTP keys are used as the key and the software input and CAS/DRM vendor unique OTP values are the data in the crypto graphic operation.
By changing the key generation inputs used to compute S1 and S2 values, the SoC can derive unique key outputs for each CAS and DRM security provider used for a given content provider or broadcaster. CAS unique inputs such as their assigned conditional access identifier (CA ID) maybe used to differentiate derived keys for different conditional access systems CAS1 versus CAS2.
These security provider unique key generation outputs enable support for multiple security providers for fielded CE devices typically found in STBs 110, televisions (TVs), Smart TVs and mobile devices such as smartphones. The black box security provider provides compatible headend applications to each content provider, so that the media programs are encrypted or otherwise protected using the CAS and DRM implementation used.
Another advantage of using a derived key database is that the black box programmed OTP key secrets programmed into the SoC OTP do not have to be divulged to the multiple CAS and DRM security providers, since these security providers would use the derived key databases for their content protection systems, not the OTP value. This means that if a derived key database were compromised, it only affects the specific CAS/DRM security provider that was using that specific derived key database, i.e. such compromise would not affect the fielded CE devices or derived key databases of any other such CAS/DRM security provider.
The keys and programming infrastructure provided by an independent black box security provider enables fielded CE devices to add additional revenue baring applications to the CE device manufacturer or content provider giving these entities more flexibility in managing their business and offering new services. Besides switching out a CAS/DRM vendor for any number of reasons, enabling the ability to add applications supporting new CAS/DRM vendors in fielded CE devices can result in generating significantly higher content sale revenues without requiring consumers to upgrade their CE devices. Consumer savings are realized by extending the field life of the CE device by allowing the consumer to download new software images to enable the purchase of new content services without having to replace their fielded CE devices.
Extending Fixed Secrets with Key Derivation Key derivation techniques can be used to extend the fixed secret, S1, shown in FIGS. 5A and 5B to decrypt either of the encrypted paring keys ES 1 [Kp], ES 2 [Kp] to with secrets S1 and S2, respectively produce the pairing key Kp that is used to decrypt the ECW shown in FIG. 4C. The extension provides the ability to: (1) Use derived root keys to produce S1 and alternately or in addition, using such root keys to produce S2 and (2) Use this derivation process as a means of renewing key material for a fielded system.
For example, in a System-on-Chip architecture such as the architecture described in the above-referenced patent application U.S. patent application Ser. No. 15/207,332, now published as U.S. Patent Publication No. 2017/0012952, hardware root of trust values can provide the basis for security providers such as the pairing broker 304 and/or one or more of the broadcasters 102 to derive a plurality of different security keys. Such keys can be used to add new security procedures or modify procedures already implemented. This can be accomplished, for example, by altering the key generation inputs based on security provider software (CAS or DRM) and possibly inputs vendor-unique hardware root of trust values. The key generation inputs can be provided in the CAS and DRM application software that could be loaded at into consumer electronics (CE) devices such as the transport module 2002 or CAM 206 when the devices are manufacture, or remotely downloaded over the air for a fielded CE device. This permits cryptographic separation of the CE devices at both S1 and S2.
Such hardware root of trust values can include one-time-programmable (OTP) values programmed into the transport module 202 and or CAM 206 using, for example, black box techniques also described in U.S. Patent Publication No. 2017/0012952. Such OTP values may be held secret from other entities as necessary. For example, the pairing broker 304 or third party security provider may provide a black box to the broadcaster 102 or manufacturer of the STB, permitting the storage of an OTP value without disclosing that value to the security provider or broadcaster.
Another advantage of using a derived key database is that the black box programmed OTP key secrets programmed into the SoC OTP may be held secret from (do not have to be released to) the CAS or DRM security provider, since these security providers would use the OTP key secrets to derive the keys required for their content protection system. This permits supporting multiple security provider vendors. Further, if a database of derived keys database were compromised, this compromise only affects the specific CAS/DRM security provider that was using that specific derived key database, and would not affect the fielded CE devices or derived key databases of any other such CAS/DRM security provider. This allows S1 (and/or S2) to be updated in the event of an attack that compromises the database of keys.
FIG. 7 is a diagram illustrating an exemplary embodiment of the transport module 202 and the CAM 206, wherein the transport module 202 includes a hardware root of trust value OTP1 702A and/or the CAM 206 has another hardware root of trust value OTP2 702B, thus permitting at least one of the first information S1 and second information S2 to be derived from a hardware root of trust secret stored in at least one of the transport module 202 and the CAM 206.
In the illustrated embodiment, the transport module 202 has a SoC with a processor that can perform processor instructions 704A. The processor has access to OTP 1 702 and can use deriving information such as the processor instructions 704A to derive or generate the first value S1 via one or more operations 708A. Similarly, the CAM 206 comprises a SoC with a processor that can perform processor instructions 704B. The processor has access to OTP 1 702 and can use the processor instructions 704A to generate the first value S1 via one or more operations 708B.
The transport module 202 may also store one or more further hardware root of trust values OTP1 706A1 and OTP2 706A2 that can also be used as deriving information to generate the first value S1. In one embodiment, OTP1 706A1 and OTP2 706A2 are security provider-unique, with each allocated to different security providers, allowing the transport module 202 to support CAS/DRM procedures of multiple security providers, allowing each such security provider to use their own OTP value 706A to generate first information S1. However, security providers may be provided multiple OTP values as well.
Likewise, the CAM 206 may also store one or more further hardware root of trust values OTP1 706B1 and OTP2 706B2 that can also be used to generate the second value S2. OTP1 706B1 and OTP2 706B2 may be allocated to the same security provider, or different security providers, allowing the CAM 206 to support CAS/DRM procedures of multiple security providers.
Hardware Environment
FIG. 8 illustrates an exemplary computer system 800 that could be used to implement the servers or the subscriber computer 512 of the present invention. The computer 802 comprises a processor 804 and a memory, such as random access memory (RAM) 806. The computer 802 is operatively coupled to a display 822, which presents images such as windows to the user on a graphical user interface 818B. The computer system 802 may be coupled to other devices, such as a keyboard 814, a mouse device 816, a printer, etc. Of course, those skilled in the art will recognize that any combination of the above components, or any number of different components, peripherals, and other devices, may be used with the computer 802.
Generally, the computer 802 operates under control of an operating system 808 stored in the memory 806, and interfaces with the user to accept inputs and commands and to present results through a graphical user interface (GUI) module 818A. Although the GUI module 818A is depicted as a separate module, the instructions performing the GUI functions can be resident or distributed in the operating system 808, the computer program 810, or implemented with special purpose memory and processors. The computer 802 also implements a compiler 812 which allows an application program 810 written in a programming language such as COBOL, C++, FORTRAN, or other language to be translated into processor 804 readable code. After completion, the application 810 accesses and manipulates data stored in the memory 806 of the computer 802 using the relationships and logic that was generated using the compiler 812. The computer 802 also optionally comprises an external communication device such as a modem, satellite link, Ethernet card, or other device for communicating with other computers.
In one embodiment, instructions implementing the operating system 808, the computer program 810, and the compiler 812 are tangibly embodied in a computer-readable medium, e.g., data storage device 820, which could include one or more fixed or removable data storage devices, such as a zip drive, floppy disc drive 824, hard drive, CD-ROM drive, tape drive, etc. Further, the operating system 808 and the computer program 810 are comprised of instructions which, when read and executed by the computer 802, causes the computer 802 to perform the steps necessary to implement and/or use the present invention. Computer program 810 and/or operating instructions may also be tangibly embodied in memory 806 and/or data communications devices 830, thereby making a computer program product or article of manufacture according to the invention. As such, the terms “article of manufacture,” “program storage device” and “computer program product” as used herein are intended to encompass a computer program accessible from any computer readable device or media.
Those skilled in the art will recognize many modifications may be made to this configuration without departing from the scope of the present invention. For example, those skilled in the art will recognize that any combination of the above components, or any number of different components, peripherals, and other devices, may be used with the present invention.
CONCLUSION
This concludes the description of the preferred embodiments of the present invention. The foregoing description of the preferred embodiment of the invention has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. It is intended that the scope of the invention be limited not by this detailed description, but rather by the claims appended hereto. The above specification, examples and data provide a complete description of the manufacture and use of the composition of the invention. Since many embodiments of the invention can be made without departing from the spirit and scope of the invention, the invention resides in the claims hereinafter appended.

Claims (30)

What is claimed is:
1. A method of brokering an enabling of communication of encrypted media programs from a plurality of broadcasters to a plurality of receivers, each encrypted media program decryptable by a first receiver module securely communicating with a second receiver module according to a pairing key associated with one of the plurality of receivers, comprising the steps of:
transmitting a first service enabling request from one of the plurality of broadcasters to a broker independent from the one of the plurality of broadcasters, the request comprising an identification of the one of the plurality of receivers;
receiving a first encrypted version of the pairing key ES 1 [Kp] from the broker, the first encrypted version of the pairing key ES 1 [Kp] decryptable by first information S1 securely stored in the first receiver module of the one of the plurality of receivers;
encrypting the pairing key with second information S2 to generate a second encrypted version of the pairing key Kp, the second encrypted version of the pairing key ES 2 [Kp] decryptable by the second information S2 securely stored in the second receiver module; and
transmitting the first encrypted version of the pairing key ES 1 [Kp] and the second encrypted version of the pairing key ES 2 [Kp] to the one of the plurality of receivers;
wherein at least one of the first information S1 and the second information S2 is derived from a hardware root of trust stored in at least one of the first receiver module and the second receiver module.
2. The method of claim 1, wherein the hardware root of trust is a secret one-time programmably stored in at least one of the first receiver module and the second receiver module.
3. The method of claim 1, wherein:
the first information S1 is derived from a first secret one time programmably stored in the first receiver module and first deriving information.
4. The method of claim 3, wherein:
the first deriving information comprises a plurality of instructions stored in the first receiver module.
5. The method of claim 4, wherein:
the first deriving information further comprises a key.
6. The method of claim 5, wherein:
the key is a security provider-unique one time programmable value known only to the security provider.
7. The method of claim 3, wherein the first deriving information is remotely downloaded to the first receiver module.
8. The method of claim 1, wherein at least one of the encrypted media programs is encrypted according to an encrypted control word E[CW], and the method further comprising the steps of:
decrypting the first encrypted version of the pairing key ES 1 [Kp] in the first receiver module;
decrypting the second encrypted version of the pairing key ES 2 [Kp] in the second receiver module;
decrypting the encrypted control word E[CW] in the second receiver module;
re-encrypting the decrypted control word CW according to the decrypted second encrypted version of the pairing key;
providing the re-encrypted control word EK p [CW] from the second receiver module to the first receiver module; and
decrypting the re-encrypted control word EK p [CW] using the decrypted first encrypted version of the pairing key Kp.
9. The method of claim 1, wherein the first service enabling request is for one service from the one of the plurality of broadcasters.
10. The method of claim 1, wherein the first service enabling request is for a plurality of services from the one of the plurality of broadcasters.
11. A system for brokering an enabling of communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers, each encrypted media program decryptable by a first receiver module securely communicating with a second receiver module according to a pairing key Kp associated with one of the plurality of receivers, the system comprising:
a broker, having a server processor and a memory, the memory comprising broker processor instructions including instructions for providing a first encrypted version of the pairing key ES 2 [Kp] in response to a service enabling request from one of the plurality of broadcasters, the service enabling request having an identification of one of the plurality of receivers; and
wherein:
the first encrypted version of the pairing key ES 1 [Kp] is decryptable by first information S1 stored in the first receiver module; and
the first information S1 is derived from a hardware root of trust stored in at least one of the first receiver module and the second receiver module.
12. The system of claim 11, wherein the hardware root of trust is a secret one-time programmably stored in at least one of the first receiver module and the second receiver module.
13. The system of claim 11, wherein:
the first information S1 is derived from a first secret one time programmably stored in the first receiver module and first deriving information.
14. The system of claim 13, wherein:
the first deriving information comprises a plurality of receiver instructions stored in the first receiver module.
15. The system of claim 14, wherein:
the first deriving information further comprises a key.
16. The system of claim 15, wherein:
the key is a security provider-unique one time programmable value known only to the security provider.
17. The system of claim 13, wherein the first deriving information is remotely downloaded to the first receiver module.
18. The system of claim 11, wherein the broker provides a first encrypted version of a different pairing key for each service requested from the one of the plurality of broadcasters to the one of the plurality of receivers.
19. The system of claim 11, wherein the broker provides a first encrypted version of the same pairing key for every service requested from the one of the plurality of broadcasters to the one of the plurality of receivers.
20. The system of claim 11, wherein:
the first receiver module receives the first encrypted version ES 1 [Kp] of the pairing key Kp and a second encrypted version of the pairing key ES 2 [Kp] from the one of the plurality of broadcasters, the second encrypted version of the pairing key ES 2 [Kp] being generated by the one of the plurality of broadcasters and decryptable by second information S2 stored in the second receiver module.
21. An apparatus for brokering an enabling of communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers, each encrypted media program decryptable by a first receiver module securely communicating with a second receiver module according to a pairing key associated with one of the plurality of receivers, the apparatus comprising:
means for transmitting a service enabling request from one of the plurality of broadcasters to a broker independent from the one of the plurality of broadcasters, the request comprising an identification of the one of the plurality of receivers;
means for receiving a first encrypted version of the pairing key ES 1 [Kp] from the broker, the first encrypted version of the pairing key ES 1 [Kp] decryptable by first information S1 securely stored in the first receiver module of the one of the plurality of receivers;
means for encrypting the pairing key with second information S2 to generate a second encrypted version of the pairing key Kp, the second encrypted version of the pairing key ES 2 [Kp] decryptable by the second information S2 securely stored in the second receiver module; and
means for transmitting the first encrypted version of the pairing key ES 1 [Kp] and the second encrypted version of the pairing key ES 2 [Kp] to the one of the plurality of receivers;
wherein at least one of the first information S1 and the second information S2 is derived from a hardware root of trust stored in at least one of the first receiver module and the second receiver module.
22. The apparatus of claim 21, wherein the hardware root of trust is a secret one-time programmably stored in at least one of the first receiver module and the second receiver module.
23. The apparatus of claim 21, wherein:
the first information S1 is derived from a first secret one time programmably stored in the first receiver module and first deriving information.
24. The apparatus of claim 23, wherein:
the first deriving information comprises a plurality of instructions stored in the first receiver module.
25. The apparatus of claim 24, wherein:
the first deriving information further comprises a key.
26. The apparatus of claim 25, wherein:
the key is a security provider-unique one time programmable value known only to the security provider.
27. The apparatus of claim 23, wherein the first deriving information is remotely downloaded to the first receiver module.
28. The apparatus of claim 21, wherein at least one of the encrypted media programs is encrypted according to an encrypted control word E[CW], and the apparatus further comprises:
means for decrypting the first encrypted version of the pairing key ES 2 [Kp] in the first receiver module;
means for decrypting the second encrypted version of the pairing key ES 2 [Kp] in the second receiver module;
means for decrypting the encrypted control word E[CW] in the second receiver module;
means for re-encrypting the decrypted control word CW according to the decrypted second encrypted version of the pairing key;
means for providing the re-encrypted control word EK p [CW] from the second receiver module to the first receiver module; and
means for decrypting the re-encrypted control word EK p [CW] using the decrypted first encrypted version of the pairing key Kp.
29. The apparatus of claim 21, wherein the first service enabling request is for one service from the one of the plurality of broadcasters.
30. The apparatus of claim 21, wherein the first service enabling request is for a plurality of services from the one of the plurality of broadcasters.
US15/652,082 2004-10-18 2017-07-17 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system Expired - Fee Related US10477151B2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US15/652,082 US10477151B2 (en) 2004-10-18 2017-07-17 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
PCT/US2018/042542 WO2019018431A1 (en) 2017-07-17 2018-07-17 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US16/670,957 US20200068175A1 (en) 2004-10-18 2019-10-31 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US16/670,912 US20200068174A1 (en) 2004-10-18 2019-10-31 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US61966304P 2004-10-18 2004-10-18
PCT/US2005/037197 WO2006044765A2 (en) 2004-10-18 2005-10-18 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US79527207A 2007-07-13 2007-07-13
US13/541,492 US9014375B2 (en) 2004-10-18 2012-07-03 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US14/692,500 US9712786B2 (en) 2004-10-18 2015-04-21 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US201762446196P 2017-01-13 2017-01-13
US15/652,082 US10477151B2 (en) 2004-10-18 2017-07-17 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/692,500 Continuation-In-Part US9712786B2 (en) 2004-10-18 2015-04-21 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US16/670,912 Continuation US20200068174A1 (en) 2004-10-18 2019-10-31 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US16/670,957 Continuation US20200068175A1 (en) 2004-10-18 2019-10-31 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system

Publications (2)

Publication Number Publication Date
US20170318263A1 US20170318263A1 (en) 2017-11-02
US10477151B2 true US10477151B2 (en) 2019-11-12

Family

ID=60159195

Family Applications (3)

Application Number Title Priority Date Filing Date
US15/652,082 Expired - Fee Related US10477151B2 (en) 2004-10-18 2017-07-17 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US16/670,912 Abandoned US20200068174A1 (en) 2004-10-18 2019-10-31 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US16/670,957 Abandoned US20200068175A1 (en) 2004-10-18 2019-10-31 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system

Family Applications After (2)

Application Number Title Priority Date Filing Date
US16/670,912 Abandoned US20200068174A1 (en) 2004-10-18 2019-10-31 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US16/670,957 Abandoned US20200068175A1 (en) 2004-10-18 2019-10-31 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system

Country Status (1)

Country Link
US (3) US10477151B2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10348501B2 (en) * 2015-07-10 2019-07-09 Inside Secure Method and apparatus for a blackbox programming system permitting downloadable applications and multiple security profiles providing hardware separation of services in hardware constrained devices
WO2021051002A1 (en) * 2019-09-12 2021-03-18 Intertrust Technologies Corporation Dynamic broadcast content access management systems and methods

Citations (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4757534A (en) 1984-12-18 1988-07-12 International Business Machines Corporation Code protection using cryptography
US5790663A (en) 1996-03-28 1998-08-04 Advanced Micro Devices, Inc. Method and apparatus for software access to a microprocessor serial number
US5940504A (en) 1991-07-01 1999-08-17 Infologic Software, Inc. Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site
WO1999043120A1 (en) 1998-02-20 1999-08-26 Digital Video Express, L.P. Information access control system and method
WO1999053689A1 (en) 1998-04-15 1999-10-21 Digital Video Express, L.P. Conditional access via secure logging with simplified key management
US6240401B1 (en) 1998-06-05 2001-05-29 Digital Video Express, L.P. System and method for movie transaction processing
US6243468B1 (en) 1998-04-29 2001-06-05 Microsoft Corporation Software anti-piracy system that adapts to hardware upgrades
US6285774B1 (en) 1998-06-08 2001-09-04 Digital Video Express, L.P. System and methodology for tracing to a source of unauthorized copying of prerecorded proprietary material, such as movies
WO2002001333A2 (en) 2000-06-27 2002-01-03 Microsoft Corporation System and method for providing an individualized secure repository
US20020018568A1 (en) 2000-08-03 2002-02-14 Weaver J. Dewey Method and system for encrypting and storing content to a user
US20020021805A1 (en) 1999-01-06 2002-02-21 Schumann Robert Wilhelm Digital content distribution system and method
US6393128B1 (en) 1998-09-01 2002-05-21 Mindport B. V. System for broadcasting data signals in a secure manner
US20020067914A1 (en) 2000-01-05 2002-06-06 Schumann Robert Wilhelm Content packet distribution system
US20020094084A1 (en) 1995-12-04 2002-07-18 Wasilewski Anthony Hj. Method and apparatus for providing conditional access in connection-oriented interactive networks with a multiplicity of service providers
US20030026433A1 (en) 2001-07-31 2003-02-06 Matt Brian J. Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique
US20030046568A1 (en) 2001-09-06 2003-03-06 Riddick Christopher J. Media protection system and method and hardware decryption module used therein
US20030061477A1 (en) 2001-09-21 2003-03-27 Kahn Raynold M. Method and apparatus for encrypting media programs for later purchase and viewing
US6550011B1 (en) 1998-08-05 2003-04-15 Hewlett Packard Development Company, L.P. Media content protection utilizing public key cryptography
US20030188164A1 (en) 2002-03-27 2003-10-02 General Instrument Corporation Smart card mating protocol
US20040010717A1 (en) 2002-01-29 2004-01-15 Intertainer Asia Pte Ltd. Apparatus and method for preventing digital media piracy
US6681212B1 (en) 1999-04-23 2004-01-20 Nianning Zeng Internet-based automated system and a method for software copyright protection and sales
US20040034582A1 (en) 2001-01-17 2004-02-19 Contentguard Holding, Inc. System and method for supplying and managing usage rights based on rules
US20040039704A1 (en) 2001-01-17 2004-02-26 Contentguard Holdings, Inc. System and method for supplying and managing usage rights of users and suppliers of items
US20040044891A1 (en) 2002-09-04 2004-03-04 Secure Computing Corporation System and method for secure group communications
US20040078575A1 (en) 2002-01-29 2004-04-22 Morten Glenn A. Method and system for end to end securing of content for video on demand
US20040107356A1 (en) 1999-03-16 2004-06-03 Intertrust Technologies Corp. Methods and apparatus for persistent control and protection of content
US20040133803A1 (en) 1999-05-05 2004-07-08 Rabin Michael O. Methods and apparatus for protecting information
US20040184616A1 (en) 2003-03-18 2004-09-23 Widevine Technologies, Inc. System, method, and apparatus for securely providing content viewable on a secure device
US20050005098A1 (en) 2003-04-08 2005-01-06 Olivier Michaelis Associating software with hardware using cryptography
EP1555822A1 (en) 2004-01-16 2005-07-20 The Directv Group, Inc. Distribution of video content using client to host pairing of integrated receivers/decoders
US20050172122A1 (en) 2004-02-03 2005-08-04 Hank Risan Method and system for controlling presentation of computer readable media on a media storage device
US6931545B1 (en) 2000-08-28 2005-08-16 Contentguard Holdings, Inc. Systems and methods for integrity certification and verification of content consumption environments
EP1575291A2 (en) 2004-01-16 2005-09-14 The Direct TV Group, Inc Distribution of video content using a trusted network key for sharing content
EP1585329A2 (en) 2004-01-16 2005-10-12 The Directv Group, Inc. Distribution of broadcast content for remote decryption and viewing
US6957344B1 (en) 1999-07-09 2005-10-18 Digital Video Express, L.P. Manufacturing trusted devices
US20050278257A1 (en) 2004-06-10 2005-12-15 Barr David A Content security system for screening applications
US20060010500A1 (en) 2004-02-03 2006-01-12 Gidon Elazar Protection of digital data content
US20060143481A1 (en) 2003-03-18 2006-06-29 Widevine Technologies, Inc. System, method, and apparatus for securely providing content viewable on a secure device
US20060159303A1 (en) 1993-11-18 2006-07-20 Davis Bruce L Integrating digital watermarks in multimedia content
US20060239503A1 (en) 2005-04-26 2006-10-26 Verance Corporation System reactions to the detection of embedded watermarks in a digital host content
US7174512B2 (en) 2000-12-01 2007-02-06 Thomson Licensing S.A. Portal for a communications system
US20070033419A1 (en) 2003-07-07 2007-02-08 Cryptography Research, Inc. Reprogrammable security for controlling piracy and enabling interactive content
US7295681B2 (en) 2005-01-27 2007-11-13 Sarnoff Corporation Method and apparatus for providing improved workflow for digital watermarking
US7376233B2 (en) 2002-01-02 2008-05-20 Sony Corporation Video slice and active region based multiple partial encryption
US7565546B2 (en) * 1999-03-30 2009-07-21 Sony Corporation System, method and apparatus for secure digital content transmission
US7684409B2 (en) 2004-06-10 2010-03-23 The Directv Group, Inc. Efficient message delivery in a multi-channel uni-directional communications system
US7797552B2 (en) * 2001-09-21 2010-09-14 The Directv Group, Inc. Method and apparatus for controlling paired operation of a conditional access module and an integrated receiver and decoder
US20150113278A1 (en) 2012-03-02 2015-04-23 Syphermedia International, Inc. Blackbox security provider programming system permitting multiple customer use and in field conditional access switching
US20170012952A1 (en) 2015-07-10 2017-01-12 Syphermedia International, Inc. Method and apparatus for a blackbox programming system permitting downloadable applications and multiple security profiles providing hardware separation of services in hardware constrained devices

Patent Citations (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4757534A (en) 1984-12-18 1988-07-12 International Business Machines Corporation Code protection using cryptography
US5940504A (en) 1991-07-01 1999-08-17 Infologic Software, Inc. Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site
US20060159303A1 (en) 1993-11-18 2006-07-20 Davis Bruce L Integrating digital watermarks in multimedia content
US20020094084A1 (en) 1995-12-04 2002-07-18 Wasilewski Anthony Hj. Method and apparatus for providing conditional access in connection-oriented interactive networks with a multiplicity of service providers
US5790663A (en) 1996-03-28 1998-08-04 Advanced Micro Devices, Inc. Method and apparatus for software access to a microprocessor serial number
WO1999043120A1 (en) 1998-02-20 1999-08-26 Digital Video Express, L.P. Information access control system and method
WO1999053689A1 (en) 1998-04-15 1999-10-21 Digital Video Express, L.P. Conditional access via secure logging with simplified key management
US6243468B1 (en) 1998-04-29 2001-06-05 Microsoft Corporation Software anti-piracy system that adapts to hardware upgrades
US6240401B1 (en) 1998-06-05 2001-05-29 Digital Video Express, L.P. System and method for movie transaction processing
US6285774B1 (en) 1998-06-08 2001-09-04 Digital Video Express, L.P. System and methodology for tracing to a source of unauthorized copying of prerecorded proprietary material, such as movies
US6550011B1 (en) 1998-08-05 2003-04-15 Hewlett Packard Development Company, L.P. Media content protection utilizing public key cryptography
US6393128B1 (en) 1998-09-01 2002-05-21 Mindport B. V. System for broadcasting data signals in a secure manner
US20020021805A1 (en) 1999-01-06 2002-02-21 Schumann Robert Wilhelm Digital content distribution system and method
US20040107356A1 (en) 1999-03-16 2004-06-03 Intertrust Technologies Corp. Methods and apparatus for persistent control and protection of content
US7565546B2 (en) * 1999-03-30 2009-07-21 Sony Corporation System, method and apparatus for secure digital content transmission
US6681212B1 (en) 1999-04-23 2004-01-20 Nianning Zeng Internet-based automated system and a method for software copyright protection and sales
US20040133803A1 (en) 1999-05-05 2004-07-08 Rabin Michael O. Methods and apparatus for protecting information
US20060005253A1 (en) 1999-07-09 2006-01-05 Goldshlag David M Manufacturing trusted devices
US6957344B1 (en) 1999-07-09 2005-10-18 Digital Video Express, L.P. Manufacturing trusted devices
US20020067914A1 (en) 2000-01-05 2002-06-06 Schumann Robert Wilhelm Content packet distribution system
WO2002001333A2 (en) 2000-06-27 2002-01-03 Microsoft Corporation System and method for providing an individualized secure repository
US20020018568A1 (en) 2000-08-03 2002-02-14 Weaver J. Dewey Method and system for encrypting and storing content to a user
US6931545B1 (en) 2000-08-28 2005-08-16 Contentguard Holdings, Inc. Systems and methods for integrity certification and verification of content consumption environments
US7174512B2 (en) 2000-12-01 2007-02-06 Thomson Licensing S.A. Portal for a communications system
US20040034582A1 (en) 2001-01-17 2004-02-19 Contentguard Holding, Inc. System and method for supplying and managing usage rights based on rules
US20040039704A1 (en) 2001-01-17 2004-02-26 Contentguard Holdings, Inc. System and method for supplying and managing usage rights of users and suppliers of items
US20030026433A1 (en) 2001-07-31 2003-02-06 Matt Brian J. Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique
US20030046568A1 (en) 2001-09-06 2003-03-06 Riddick Christopher J. Media protection system and method and hardware decryption module used therein
US20080279386A1 (en) 2001-09-21 2008-11-13 The Directv Group, Inc. Method and apparatus for encrypting media programs for later purchase and viewing
US20030061477A1 (en) 2001-09-21 2003-03-27 Kahn Raynold M. Method and apparatus for encrypting media programs for later purchase and viewing
US7797552B2 (en) * 2001-09-21 2010-09-14 The Directv Group, Inc. Method and apparatus for controlling paired operation of a conditional access module and an integrated receiver and decoder
US7409562B2 (en) * 2001-09-21 2008-08-05 The Directv Group, Inc. Method and apparatus for encrypting media programs for later purchase and viewing
US7376233B2 (en) 2002-01-02 2008-05-20 Sony Corporation Video slice and active region based multiple partial encryption
US20040078575A1 (en) 2002-01-29 2004-04-22 Morten Glenn A. Method and system for end to end securing of content for video on demand
US20040010717A1 (en) 2002-01-29 2004-01-15 Intertainer Asia Pte Ltd. Apparatus and method for preventing digital media piracy
US7328345B2 (en) 2002-01-29 2008-02-05 Widevine Technologies, Inc. Method and system for end to end securing of content for video on demand
US20030188164A1 (en) 2002-03-27 2003-10-02 General Instrument Corporation Smart card mating protocol
US20040044891A1 (en) 2002-09-04 2004-03-04 Secure Computing Corporation System and method for secure group communications
US20040184616A1 (en) 2003-03-18 2004-09-23 Widevine Technologies, Inc. System, method, and apparatus for securely providing content viewable on a secure device
US7007170B2 (en) 2003-03-18 2006-02-28 Widevine Technologies, Inc. System, method, and apparatus for securely providing content viewable on a secure device
US20060101287A1 (en) 2003-03-18 2006-05-11 Widevine Technologies, Inc. System, method, and apparatus for securely providing content viewable on a secure device
US20060143481A1 (en) 2003-03-18 2006-06-29 Widevine Technologies, Inc. System, method, and apparatus for securely providing content viewable on a secure device
US7356143B2 (en) 2003-03-18 2008-04-08 Widevine Technologies, Inc System, method, and apparatus for securely providing content viewable on a secure device
US20050005098A1 (en) 2003-04-08 2005-01-06 Olivier Michaelis Associating software with hardware using cryptography
US20070033419A1 (en) 2003-07-07 2007-02-08 Cryptography Research, Inc. Reprogrammable security for controlling piracy and enabling interactive content
US7548624B2 (en) 2004-01-16 2009-06-16 The Directv Group, Inc. Distribution of broadcast content for remote decryption and viewing
US7580523B2 (en) 2004-01-16 2009-08-25 The Directv Group, Inc. Distribution of video content using client to host pairing of integrated receivers/decoders
EP1555822A1 (en) 2004-01-16 2005-07-20 The Directv Group, Inc. Distribution of video content using client to host pairing of integrated receivers/decoders
US7599494B2 (en) 2004-01-16 2009-10-06 The Directv Group, Inc. Distribution of video content using a trusted network key for sharing content
EP1585329A2 (en) 2004-01-16 2005-10-12 The Directv Group, Inc. Distribution of broadcast content for remote decryption and viewing
EP1575291A2 (en) 2004-01-16 2005-09-14 The Direct TV Group, Inc Distribution of video content using a trusted network key for sharing content
US20060010500A1 (en) 2004-02-03 2006-01-12 Gidon Elazar Protection of digital data content
US20050172122A1 (en) 2004-02-03 2005-08-04 Hank Risan Method and system for controlling presentation of computer readable media on a media storage device
US20050278257A1 (en) 2004-06-10 2005-12-15 Barr David A Content security system for screening applications
US7684409B2 (en) 2004-06-10 2010-03-23 The Directv Group, Inc. Efficient message delivery in a multi-channel uni-directional communications system
US7295681B2 (en) 2005-01-27 2007-11-13 Sarnoff Corporation Method and apparatus for providing improved workflow for digital watermarking
US20060239503A1 (en) 2005-04-26 2006-10-26 Verance Corporation System reactions to the detection of embedded watermarks in a digital host content
US20150113278A1 (en) 2012-03-02 2015-04-23 Syphermedia International, Inc. Blackbox security provider programming system permitting multiple customer use and in field conditional access switching
US20170012952A1 (en) 2015-07-10 2017-01-12 Syphermedia International, Inc. Method and apparatus for a blackbox programming system permitting downloadable applications and multiple security profiles providing hardware separation of services in hardware constrained devices

Non-Patent Citations (9)

* Cited by examiner, † Cited by third party
Title
Cinea press release "Cinea, Inc. to Provide IFE Key Management Servies for Universal Pictures and Twentieth Century Fox" Sep. 9, 2003.
Digital lifestyles Magazine Article "Secure DVD Players for BAFTA Judges", Aug. 31, 2004.
EP Further Examination Report (contained in a Summons to attend oral proceedings) dated Feb. 28, 2014 for European Application No. 05811812.6.
EP Office Action dated Jan. 13, 2011, Application No. 05811812.6.
Jean-Luc Giachetti; A Common Conditional Access Interface for Digital Video Broadcasting Decoders ; IEEE Transactions on Consumer Electronics, vol. 41, No. 3, Aug. 1995; p. 836-841 (Year: 1995). *
ORM Watch Magazine Article "Cinea DRM for DVDs Endorsed for Oscar Screeners", Jul. 8, 2004.
PCT International Search Report & Written Opinion dated Sep. 26, 2018 for PCT Application No. PCT/US2018/042542.
PCT/US2005/037197 International Search Report and Written Opinion.
Response to EP Office Action dated Jan. 13, 2011.

Also Published As

Publication number Publication date
US20170318263A1 (en) 2017-11-02
US20200068174A1 (en) 2020-02-27
US20200068175A1 (en) 2020-02-27

Similar Documents

Publication Publication Date Title
US9712786B2 (en) Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
KR100641218B1 (en) Conditional access broadcasting system for terrestrial digital multimedia broadcasting and method thereof
US6738905B1 (en) Conditional access via secure logging with simplified key management
US6055314A (en) System and method for secure purchase and delivery of video content programs
KR100629413B1 (en) Smartcard for use with a receiver of encrypted broadcast signal, and receiver
US7970138B2 (en) Method and apparatus for supporting broadcast efficiency and security enhancements
EP2066127B1 (en) A method, apparatus and system to manage access to program content
US20070201695A1 (en) Pay per minute for DVB-H services
JP2008547312A (en) Multimedia access device registration system and method
JP2001519629A (en) Method and apparatus for transmitting an encrypted data stream
CN1550100A (en) CA system for using multiple cipher key broadcasting DTV to different service supply merchants and service areas
JP2005341606A (en) Authorization of services in conditional access system
EP1903799B1 (en) A method for realizing preview of iptv programs, an encryption apparatus, a right center system and a user terminal
US20200068175A1 (en) Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
TWI523534B (en) Method for transmitting and receiving a multimedia content
JP2007501556A (en) Copy protection application in digital broadcasting system
CN101442660B (en) System for receiving download type digital television condition and dynamic download method thereof
WO2019018431A1 (en) Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US20060059506A1 (en) Conditional access system for digital television content based on prepayment and optimisation of the bandwidth of the channel broadcasting said content
US20220385987A1 (en) Multimedia content secure access
WO2009075535A2 (en) Prepaid broadcasting receiver and subscriber management system and method thereof in digital multimedia broadcasting service
Yang et al. Authentication scheme and simplified CAS in mobile multimedia broadcast
KR101240659B1 (en) Cas system and method for digital broadcating receiver

Legal Events

Date Code Title Description
AS Assignment

Owner name: SYPHERMEDIA INTERNATIONAL, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:COCCHI, RONALD P.;GAGNON, GREGORY J.;FLAHARTY, DENNIS R.;AND OTHERS;SIGNING DATES FROM 20171005 TO 20171009;REEL/FRAME:044993/0028

AS Assignment

Owner name: INSIDE SECURE S.A., FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SYPHERMEDIA INTERNATIONAL, INC.;REEL/FRAME:045053/0301

Effective date: 20180123

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: GLAS SAS, AS SECURITY AGENT, FRANCE

Free format text: SECURITY INTEREST;ASSIGNOR:INSIDE SECURE;REEL/FRAME:048449/0887

Effective date: 20190227

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

AS Assignment

Owner name: VERIMATRIX, FRANCE

Free format text: CHANGE OF NAME;ASSIGNOR:INSIDE SECURE;REEL/FRAME:050647/0428

Effective date: 20190624

AS Assignment

Owner name: VERIMATRIX, FRANCE

Free format text: CHANGE OF ADDRESS;ASSIGNOR:VERIMATRIX;REEL/FRAME:050733/0003

Effective date: 20190930

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: INSIDE SECURE, FRANCE

Free format text: PARTIAL RELEASE OF SECURITY INTEREST IN PATENT COLLATERAL;ASSIGNOR:GLAS SAS, AS AGENT;REEL/FRAME:051076/0306

Effective date: 20191112

AS Assignment

Owner name: RAMBUS INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VERIMATRIX;REEL/FRAME:051262/0413

Effective date: 20191113

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20231112